Website project 308 student file management system based on SSM

1. System screenshots (you can chat privately if you need a demonstration video)

          

Summary

The fast-paced development of the modern economy and the constantly improving and upgrading of information technology have upgraded traditional data information management to software storage, summary, and centralized processing of data information management methods. This student file management system was born in such a big environment. It can help managers process huge data information in a short time. Using this software tool can help managers improve transaction processing efficiency and achieve twice the result with half the effort. This student file management system utilizes the current mature and complete SSM framework, uses the cross-platform Java language that can develop large-scale commercial websites, and the Mysql database, one of the most popular RDBMS application software, for program development. The development of the student file management system is based on Operators need to design an interface that is simple and beautiful, and is consistent with websites of the same type in terms of functional module layout. When the program implements basic required functions, it also provides some practical solutions to the security issues faced by data information. It can be said that this program not only helps managers handle work affairs efficiently, but also realizes the integration, standardization and automation of data information.

Keywords: student record management system; SSM framework; Mysql; automation


 

 

1 Introduction

1.1 Research background

1.2 Purpose and significance

1.3 Thesis structure arrangement

2Sokan Technology 

2.1 Introduction to SSM framework

2.2 Introduction to B/S structure

2.3 Introduction to Mysql database

3 System analysis

3.1 System Feasibility Analysis

3.1.1 Technical feasibility analysis

3.1.2 Economic feasibility analysis

3.1.3 Operation feasibility analysis

3.2 System performance analysis

3.2.1 Ease of use indicators

3.2.2 Scalability indicators

3.2.3 Robustness indicators

3.2.4 Security indicators

3.3 System process analysis

3.3.1 Operation process analysis

3.3.2 Login process analysis

3.3.3 Analysis of information adding process

3.3.4 Analysis of information deletion process

4system design 

4.1 System outline design

4.2 System functional structure design

4.3 Database design

4.3.1 Database E-R diagram design

4.3.2 Database table structure design

5system implementation 

5.1 User information management

5.2 Class and grade management

5.3 Educational experience management

5.1 Announcement information management

6system examination 

6.1 Characteristics of system testing

6.2 System function test

6.2.1 Login function test

6.2.2 Add category function test

6.3 Test result analysis

in conclusion

  

references

1 Introduction

1.1 Research background

The current competitive pressure in various industries in society is very high. With the informatization and scientific development of the current era, all industries and fields in society are scrambling to use new information technology to scientifically and standardize management of various relevant data in the industry. . Such an environment puts those companies that stand still and do not accept the information technology brought by the information reform at risk of being eliminated and replaced at any time. So today, various industries, whether it is the traditional education industry, catering industry, tourism industry, medical industry and other fields, will use new information technology to carry out information revolution, changing the traditional paper-based work that requires manual processing. Office environment. It is the development requirement of the times that software information technology can cover various industries and fields in society. The true electronicization of various data and documents is an irreversible and inevitable trend in the development of the information society. This student file management system also closely follows the development of science and technology, using today's first-class software technology to realize the development of software systems, allowing doctors to manage information completely through the management system to achieve scientific, standardized and programmed management. This helps information managers save transaction processing time, reduce the error rate of data processing, promotes the management level of basic data, and avoids random business management work to a certain extent. At the same time, student file management The various dynamic information stored in the system's database also provide a large amount of factual basis for upper-level managers to make major decisions. In short, the student file management system is a software system that can truly improve the office efficiency of managers.

1.2 purpose and meaning

The processing of information data relies entirely on manual operations, which consumes a lot of labor costs. Especially when faced with a large amount of data information, traditional manual operations not only cannot guarantee the error rate of data, but are also prone to low utilization of various information resources. rate and low security issues. What's more, it wastes a lot of valuable time, especially updating information, summarizing and making statistics, which is a process that consumes money and energy. Therefore, the emergence of electronic information management can alleviate and change the situation faced by traditional manual methods. On the one hand, it can ensure that information data is processed efficiently in a short time and save labor costs. On the other hand, it can ensure the security and reliability of information data. It is flexible and can realize fast retrieval and modification operations of information data. These advantages are unmatched by the previous old operation mode. Therefore, the student file management system provides an important window for the upgrading and reform of the data information management model.

1.3 论文结构安控

In order to help users better understand and understand the development process and related content of the program, this article will elaborate on the content in six chapters.

Chapter 1: Describes the development background of the program, the purpose and significance of the program in real life, and the structural arrangement information of the program document;

Chapter 2: Describes the program development environment, including the technologies involved in program development, data storage tools used in program development, and other information;

Chapter 3: Describes the feasibility issues that will be faced when the program is developed, and describes the program functions and performance requirements;

Chapter 4: Describes the functional breakdown information under the large functional modules of the program, as well as the design information of the database table file structure for storing program data, etc.;

Chapter 5: Describes the content of the function implementation interface of the program, and also describes some functions operated by the program operator;

Chapter 6: Describes the testing content of program functions and introduces the concepts and methods of system testing.


2Sokan Technology 

2.1 SSM frame arrangement

The English abbreviation of the framework technology used in the program development of this project is SSM. Popular frameworks used in JavaWeb development include SSH, SSM, SpringMVC, etc. As a project program, you can also use the SSH framework, the SSM framework, and the SpringMVC. . The SSH framework is a heavyweight framework. The configuration is cumbersome and not flexible enough. Modifying the program requires modifying many files. It also takes up a lot of memory and has a relatively high CPU usage when running. SpringMVC is an MVC architecture developed by Spring. Flexible and easier to use, the SSM framework is an intermediate value. It is neither bloated with SSH nor simplified by SpringMVC. It is an intermediate level and can be written and understood during the configuration and use processes. The MyBatis framework replaces the Hibernate framework because it is more flexible and does not need to be completely operated within the framework. It can write more flexible code for data operations, and its performance is more stable than the Hibernate framework. In general, the use of the SSM framework is based on comprehensive considerations. There are many tutorials and experiences on the Internet, and SSM is so popular, so it is natural to develop with the SSM framework.

2.2B/SConstruction Summary   

In the early days, some files written in HTML language and some other resource files could be combined to form the simplest Web program. Understanding Web programs also requires understanding Web sites. The relationship between them is that one or more Web programs can Put it in a Web site (Web server) on the Internet for use. It can be said that the development of Web applications has also led to the rise of the B/S network structure model. B is the initial letter of Browser (browser), S is the initial letter of Server (server), and the combination of the two initial letters becomes the abbreviation of network structure mode B/S. Since this structural model allows access to the server through the browser installed on the client, the core functions of the program can be arranged in the server for processing, saving a lot of work in the development, later use and maintenance of the program. Figure 2.1 shows how a program developed using this architecture works.

Figure 2.1 Working principle diagram of B/S architecture

2.3 Mysql number installationInstructions

The developed program only faces users with the functional interface of the program, allowing users to operate various functions of the program interface. Then many people will ask, where is the data information generated by the user using the program functions? This requires knowledge of databases. Generally speaking, program development usually analyzes and compares the characteristics of commonly used data storage tools, such as the characteristics and advantages of Mysql database, the characteristics and advantages of Access database, and the characteristics of Sqlserver database. In the end, it depends on which database matches the program that needs to be developed and meets the data storage requirements required to run the program function. For example, if you need to develop a commercial-level program and the stored data has higher requirements on the database, you can choose Oracle. If It is a relatively simple program that does not have too many requirements for data storage. You can choose Microsoft's Access. When developing a program that requires the database to occupy a small space and meet the program data storage requirements, you can consider Oracle from the Swedish MySQL AB company. I acquired a relational database a long time ago, which is now the Mysql database. It is one of the most recognized application software among database tools. The information that needs to be explained is that this database was used in the development of this program. It saves program data by using different data tables. While increasing the storage speed of program data, it also improves the flexibility of the database. Figure 2.2 shows the architecture diagram of MySQL.


3 System analysis

When the user determines to develop a program, they need to follow the following sequence of work, which can be summarized as: system analysis-->system design-->system development-->system testing, regardless of whether there are changes or iterations in this process , all work in this order. System analysis is to analyze what the system needs to do. The main purpose is to determine the function of the system, which also makes a good start for the next work.

3.1CorollaryFeasibility analysis 

Developing a program software not only requires time, but also human and material resources. The purpose of conducting feasibility analysis is to solve users' questions and see whether the program can be developed under the current conditions.

3.1.1 Technical FeasibilityAnalysis

The development language chosen for this program is Java. This programming language has rich data types and is relatively complete in command and control statements. More importantly, it has strong support for classes and objects. These advantages provide technical support for program developers. , especially now that codes are becoming increasingly modular, and the source code related to system function development is publicly displayed on the Internet, it is gradually technically easier for developers with a certain computer development foundation to independently develop systems.

3.1.2 Economic FeasibilityAnalysis

The most critical equipment for developing this program is a computer. Whether it is a computer equipped in the school computer room or a laptop purchased since enrolling, they are all equipment that can meet the development requirements. In addition, the school has completely covered the campus on the Internet. network, so there is no need to consider economic issues in equipment and networks.

3.1.3 MovementPossibilityAnalysis

With the improvement and upgrade of computer software and supporting hardware, the current computer environment is very good, especially since computers have been widely used in every household, so computer equipment can now be seen everywhere. Since the program developed this time consumes less resources, it is It can be easily run on an ordinary computer or laptop.

Through the above feasibility description, we can solve the problem of whether program development is feasible from the economic, technical and operational aspects. Therefore, it can be considered that the program software can be developed.

3.2System performance analysis 

System performance analysis is also a relatively important content. System performance analysis is to ensure that the system functions can meet the specified indicators when running and used in daily life. Therefore, a complete system software requires the step of system performance analysis. . This performance analysis mainly analyzes the usability indicators, scalability indicators, system robustness indicators, and system security indicators.

3.2.1 Ease of use indicators

The purpose of the development of this program software is to allow users to improve the management efficiency of information data through the use of this software. At the same time, the program software also needs to set corresponding functions for different operating users. Therefore, the operation process of this program should be as consistent as possible. It is in line with the users’ daily behavioral habits of operating the software. In addition, the design and development of the program software should also consider the computer operation level of non-computer professional users, so that most users can easily operate various functions provided by the program.

3.2.2 Scalability indicators

The program software that needs to be developed currently is designed and developed according to the current user needs. However, as time goes by and the social environment changes, the programs developed also need to keep pace with the times and need to be adapted to the changing needs of users. Corresponding to the expansion of functional content, it should be noted that when adding functional modules to a formed program, it is still necessary to ensure that the original structure and functions of the program are not affected, and that the new functional modules can also run normally in the system. Compliance with this indicator can ensure that this program can calmly respond to changes in the market environment while meeting information management requirements.

3.2.3 Robustness indicators

Program software is developed so that it can process various data information stably when put into use. Once the program software becomes unstable, it will also cause interference to the user. Therefore, from the perspective of performance analysis, it is required that the program software must remain stable and be able to function normally when responding to user misoperations or when users fill in incorrect data due to various reasons. for use. When an abnormality occurs in a certain functional module of the program, other functional modules of the program must also be able to ensure normal use. Meeting the program's robustness indicators can provide users with a good user experience.

3.2.4 Security Indicators

The security of program software is the primary issue. After all, the data information stored in the database corresponding to the program is huge, and it also includes a lot of important personal information. This requires the program to have a complete security mechanism. Therefore, the program must set up a login function to check the user's identity and match the identity and permissions. By restricting the functions of different user identities, users will never be tolerated to operate the program beyond their authority. In addition, it is also necessary to always guard against computer viruses and hackers, and take targeted measures to deal with security issues to ensure that the program is always in a safe environment so that users can use it with confidence.

3.3System flow analysis 

3.3.1 OperationFlow analysis

When the program is handed over to the user for use, it is necessary to provide the operation flow chart of the program (as shown in Figure 3.1), so that the user can easily understand the specific working steps of the program. Nowadays, the operation flow of the program has a general standard, that is, first Submit the login data through the login page, and only after it is verified correctly by the program, the user can operate the corresponding function on the program function operation area page.

Figure 3.1 Program operation flow chart

3.3.2 Climb process a>Analysis

In this part, the running process of the login function module of the program (shown in Figure 3.2) needs to be explained separately. The login module set up in the program is also for security reasons, so that users can use it with peace of mind. The login module mainly allows users to submit login information, and the program performs data verification. Only users who pass the verification can successfully log in to the program.

Figure 3.2 Program login flow chart

3.3.3 Information addition process< /span>Analysis

The adding function of the program is to provide the operator with the function of entering information. Whether it involves adding user information or adding information involved in other functional modules, the information adding process of the program (as shown in Figure 3.3) is the same. The program first judges the data entered by the operator. This judgment rule is a program code written in advance. When the program determines that the data meets the requirements, the data entered by the operator will be registered in the data table, such as the added User information will write the newly added user information into the user information data table file.

Figure 3.3 Information adding flow chart

3.3.4 Information water removal step< /span>Analysis

When deleting some invalid data from the program, follow the information deletion process of the program (as shown in Figure 3.4). First, select the data that the operator needs to delete. In order to prevent the operator from accidentally deleting information, the program will also prompt. When the operator is really sure that he wants to delete the selected information, the information will be permanently deleted from the database.

Figure 3.4 Information deletion flow chart


4system design 

The design of the student file management system, such as the design of the functional framework and the design of the database, will determine whether the system is efficient at the development level and whether it is easy to maintain and upgrade at the system maintenance level, because it is required during the system implementation stage. Consider all the needs of users. If there is no comprehensive consideration in the design stage, then the system implementation part will not be able to start. Therefore, the system design part is also a crucial link. Only careful and comprehensive consideration based on user needs can we achieve success. Hope to develop functional and stable program software.

4.1System Outline Design 

In order to save development costs and facilitate later maintenance and upgrades, the system to be developed this time intends to display the system functional interface through a browser, so that the main affairs of the program software can be concentrated on the server-side processing in the background, and the front-end Part of it only needs to handle a small amount of transaction logic. A diagram (shown in Figure 4.1) is used below to illustrate the working principle of the program.

Figure 4.1 Principle diagram of program operation

4.2System structureFunctionSystem structure design 

When the user's functional requirements for the program are analyzed and obtained, program design can be carried out. Figure 4.2 shows the administrator function structure diagram.

Figure 4.2 System functional structure diagram

4.3Database Design 

Whether the program function operation is adding, modifying, or deleting, the data generated is saved and updated through the database. Therefore, the quality of a database design is also the criterion for determining whether the program is good or bad, because half of the success of the program is All the credit is due to the excellent design of the database. Once the database is well designed, it can reduce the development burden of developers.

4.3.1Number of settingsE-R design 

The design of this part requires the use of E-R diagram drawing tools. The commonly used tool is the Visio tool to draw E-R model diagrams. This tool can not only quickly create the required E-R model diagrams, but also provides a simple operation interface that can be used in a short time. Modify the graphics or text attributes of the drawing interface within. When drawing the E-R model diagram, you must clearly distinguish the meaning of each graphic to avoid drawing errors. The E-R model diagram consists of three parts of graphic symbols: rectangle (entity), ellipse (attribute), and rhombus (relationship). During the drawing, you must distinguish Then, use accurate graphical symbols to represent the corresponding data elements.

The relationship between various entities is represented by the E-R diagram in the figure below. The system E-R diagram drawn is shown in Figure 4.8.

Figure 4.8 System E-R diagram

4.3.2 DatabaseTableStructural Design

Once the database system is selected, it is necessary to create a database file in the database according to the program requirements, and in the database file that has been created, create a corresponding data table for the data generated during the program running. The data table structure design is to create a The form carries out field design, field length design, field type design, etc. Only when the data form is reasonably designed can the data information generated by the operation of the relevant program be stored normally.​ 

Table 4.1 Class/grade table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

2

banjinianji_bianhao

String

Record number

yes

3

banjinianji_dizhi

String

grade

yes

4

banjinianji_fuzeren

String

class

yes

5

banjinianji_content

String

Detailed information

yes

6

insert_time

Date

Upload time

yes

7

create_time

Date

creation time

yes

Table 4.2 File information table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

8

yonghu_id

Integer

student

yes

9

dangan_types

Integer

File type

yes

10

dangan_content

String

Detailed information

yes

11

insert_time

Date

Upload time

yes

12

create_time

Date

creation time

yes

Table 4.3 Dictionary table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

13

dic_code

String

Field

yes

14

dic_name

String

Field name

yes

15

code_index

Integer

coding

yes

16

index_name

String

encoding name

yes

17

super_types

Integer

Parent field id

yes

18

create_time

Date

creation time

yes

Table 4.4 Educational experience table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

19

jiaoyujingli_bianhao

String

serial number

yes

20

yonghu_id

Integer

student

yes

21

kaishi_time

Date

start date

yes

22

jieshu_time

Date

Termination date

yes

23

jiaoyujingli_types

Integer

Position

yes

24

jiaoyujingli_content

String

Detailed information

yes

25

insert_time

Date

Upload time

yes

26

create_time

Date

creation time

yes

Table 4.5 Message information table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

27

note

String

voicemail

yes

28

yhnote

String

commenter

yes

29

note_time

Date

Message time Search

yes

30

reply

String

reply

yes

31

glreply

String

Respondent

yes

32

reply_time

Date

Reply time Search

yes

Table 4.6 Announcement Form

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

33

news_name

String

Announcement name

yes

34

news_types

Integer

Announcement type

yes

35

news_photo

String

Announcement picture

yes

36

insert_time

Date

Announcement time

yes

37

news_content

String

Announcement details

yes

38

create_time

Date

creation time

yes

Table 4.7 Student table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

39

yonghu_xuehao

String

student ID

yes

40

yonghu_name

String

student name

yes

41

yonghu_id_number

String

ID number

yes

42

yonghu_phone

String

Phone number

yes

43

chusheng_time

Date

date of birth

yes

44

ruxiao_time

Date

Entering school date

yes

45

yonghu_minzhu

String

nationality

yes

46

yonghu_jiguan

String

Birthplace

yes

47

yonghu_yuanxi

String

Department

yes

48

yonghu_zhiwu

String

Position

yes

49

yonghu_email

String

Mail

yes

50

yonghu_photo

String

photo

yes

51

create_time

Date

creation time

yes

Table 4.8 User table

serial number

List

type of data

illustrate

Allow empty

1

Id

Int

id

no

52

role

String

Role

yes

53

addtime

Date

Add time

yes

5system implementation 

The system implementation part is to realize the functions of the system analysis and system design parts through coding, and to display the results of system analysis and system design in the form of a practical application system. In the system analysis mentioned earlier, the most important thing in system design is to carry out functions. The design of system operation logic also includes the design of databases for storing data. System implementation is the final implementation stage, where the previous design results are physically implemented. Transform and finally produce a software system that can be applied to actual applications.

5.1User information management

Figure 5.1 shows the user information management page. The functions provided to administrators on this page are: user information query management, user information can be deleted, user information can be modified, and user information can be added.

The conditions for fuzzy query on user names were also carried out

Figure 5.1 User information management page

5.2 Class and grade management

Figure 5.2 shows the class grade management page. The functions provided to administrators on this page include: viewing published class grade data, modifying class grade, and invalidating class grade, which can be deleted.

图5.2 班级年级管理页面

5.3教育经历管理

如图5.3显示的就是教育经历管理页面,此页面提供给管理员的功能有:根据教育经历进行条件查询,还可以对教育经历进行新增、修改、查询操作等等。

图5.3 教育经历管理页面

5.1公告信息管理

如图5.4显示的就是公告信息管理页面,此页面提供给管理员的功能有:根据公告信息进行新增、修改、查询操作等等。

图5.4 公告信息管理页面

6 系统测试

程序软件一旦被开发完成之后,在真正投入日常生活中进行运行使用之前,是必须要经历测试这一个重要的操作环节,因为开发期间注重的是每个单独功能模块的开发,尽管每次开发完成一个单独功能模块时,会通过单元测试进行检验,检验合格才会让程序员继续开发下一个子功能模块,以此类推,当程序员完成所有的系统子功能模块的开发时,这个时候就需要引进系统测试,系统测试就是把所有的子功能模块集成到一起,构建成整个系统,在指定的运行环境下进行运行,主要就是测试系统的所有功能模块在一起是否良好运行,一旦程序软件通过了系统测试这一环节,就意味着它可以进行最终的验收测试了,这个测试步骤的操作用户是程序面向的客户或者是最终用户了。

6.1 系统测试的特点

系统测试也是为了保证系统正式上线后,可以稳定正常运行,给使用者带来便利。系统测试也有其对应的特点:

(1)系统测试它包括了端到端的完整测试;

(2)系统测试也对程序软件的架构方面,程序软件的业务需求等方面进行了测试;

(3)系统测试一旦采用正确的方法进行,这将减少程序正式上线之后产生的各种错误;

系统测试一般都是在跟生产环境相似的环境当中运行,程序的功能比如添加功能,删除功能,修改功能等都会使用同样的数据在新系统和现有系统中进行比较,这样做让用户对新系统中的添加,修改,删除等功能能够更好地理解,也能提升用户对新系统的满意度。

6.2 系统功能测试

6.2.1 登录功能测试

要保障程序安全,首先就要从入门门槛抓起,所以程序的登录模块也是很重要的程序入门门槛,务必要保证此功能可以安全运行使用。此次对程序登录模块测试选择管理员角色进行测试(如表6.1所示)。

表6.1 登录功能测试数据表

登录账号

登录密码

操作人

最终结果

abc

abc

管理员

登录进入程序

123

abc

管理员

弹出错误登录提示

abc

123

管理员

弹出错误登录提示

6.2.2 添加类别功能测试

学生档案管理系统需要管理员添加类别信息,类别名称是程序设置的必填数据,而且添加的类别名称也不能够是数据库里面的存在的数据。对添加类别功能测试时,测试数据在下表展示。

表6.2 添加类别功能测试数据表

类别名称

反馈结果

类别1

失败

类别2

失败

类别3

成功

6.3 测试结果分析

程序经过了上述的测试环节,可以得出的测试结论有:

第一点,可以确定开发出来的学生档案管理系统是符合同类型系统的要求;

第二点,用户要求学生档案管理系统需要具备的功能都已开发完成并能够正常使用;

第三点,学生档案管理系统界面简洁美观,操作流程清晰明了;

第四点,学生档案管理系统的安全性,以及运行性能符合开发要求。

至此,学生档案管理系统可以确保所有功能能够按照预期目标进行运行,可以正式投入生活中运行使用!


结  论

通过对学生档案管理系统的开发,让我深刻明白开发一个程序软件需要经历的流程,当确定要开发一个学生档案管理系统的程序时,我在开发期间,对其功能进行合理的需求分析,然后才是程序软件的功能的框架设计,数据库的实体与数据表设计,程序软件的功能详细界面实现,以及程序的功能测试等进行全方位的细致考虑,虽然在此过程中,各个环节都遇到了大大小小的困难,但是通过对这些问题进行反复的分析,深入的思考,借助各种相关文献资料提供的方法与解决思路成功解决面临的各个问题,最后成功的让我开发的学生档案管理系统得以正常运行。

学生档案管理系统在功能上面是基本可以满足用户对系统的操作,但是这个程序软件也有许多方面是不足的,因此,在下一个时间阶段,有几点需要改进的地方需要提出来,它们分别是:

(1)操作页面可以满足用户简易操作的要求,但是在页面多样化设计层面上需要把一些比较丰富的设计结构考虑进来。

(2)程序软件的总体安全性能需要优化,例如程序的退出安全性,以及程序的并发性等问题都需要进行安全性升级,让开发的学生档案管理系统与现实中的相关网站更贴合。

(3)需要对程序的数据结构方面,程序的代码方面等进行优化,让运行起来的程序可以保持稳定运行,也让程序能够保证短时间内处理相关事务,节省处理事务的时间,提高事务处理的效率,同时对服务器上资源占用的比例进行降低。

学生档案管理系统的开发一方面是对自身专业知识技能进行最终考核,另一方面也是让自己学会独立解决程序开发过程中所遇到的问题,掌握将理论知识运用于程序开发实践的方法。学生档案管理系统的开发最终目标就是让系统更具人性化,同时在逻辑设计上,让系统能够更加的严谨。


  

大学期间的学习时光对于我来说是美好而短暂的,在这期间我也接触了许多可爱的大学同学们,以及兢兢业业教学的老师们,在我的毕业论文即将完成之际,我想对那些曾经给予我支持,帮助,还有鼓励的同学和老师以及家人们表达我内心的无比感激之情。

首先,感谢给予我论文指导的指导老师,从开题报告,任务书,论文大纲的编写与系统的功能框架设计,到最终的毕业论文,都是指导老师全程参与的悉心指导和帮忙,才能够让我的毕业论文可以符合学院要求编写完成。我的指导老师一丝不苟的教学精神以及在学术上的严谨作风,这些优点是值得我不断去努力学习的。

其次,感谢大学同学的陪伴与帮助,在我独立编写毕业论文期间,大学同学的鼓励与耐心的帮助使得我少走很多弯路,节省毕业论文的编写时间,也让我有更多精力去完善我开发的系统。

最后,感谢我最亲密的家人带给我的包容和关爱,我能够安心学习也是来源于家人们对我的无微不至的照顾,这样我才可以顺顺利利完成我的大学学业。

毕业倒计时之际,希望在今后的工作中,在今后的生活中,我会一直谨记老师们带给我的孜孜不倦的教诲,并通过不懈的努力和追求来改变自己,以此报答那些曾支持过以及帮助过我的人!


参考文献

[1]宁昭铱,陈静,张立斌.一个学生档案管理系统平台的设计[J].科技经济导刊,2017(01):32+25.

[2]李鑫.浅谈信息化学生档案管理系统的设计与实现[J].民营科技,2016(11):74.

[3]宋丽娜.基于JSP的Web开发中文乱码问题的研究与解决[J].电子技术,2015,42(11):5-7.

[4]汪君宇.基于JSP的Web应用软件开发技术分析[J].科技创新与应用,2018(16):158-160.

[5]赵钢.JSP Servlet+EJB的Web模式应用研究[J].电子设计工程,2016,21(13):47-49.

[6]肖英.解决JSP/Servlet开发中的中文乱码问题[J].科技传播,2017,(1)11-25.

[7]朱钧.基于角色的jsp通用权限系统设计与实现[D].山东大学,2014.

[8]康牧.JSP动态网站开发实用教程[M].清华大学出版社,2014.

[9]王建国.数据库设计在网站开发中的应用[J].山东农业工程学院学报,2017,34(04):158-159+164.

[10]张知青.基于关系数据库的查询方法及优化技术分析[J].煤炭技术,2015,31(05):218-220.

[11]陈志誉.Java工具及其调度方法研究[D].华南理工大学,2018.

[12]张孝祥,徐明华.JAVA基础与案例开发详解[M].清华大学出版社,2014.

[13]刘亚宾.精通Eclipse--JAVA技术大系[M].电子工业出版社,2015.

[14]曾志明.网站开发技术的比较研究[J].电脑知识与技术,2015,6(05):1075-1078.

[15]卫红春.信息系统分析与设计[M].北京:清华大学出版社,2014.

[16]于万波.网站开发与应用案例教程[M].清华大学出版社,2013.

[17]黎连业,王华,李淑春.软件测试与测试技术[M].清华大学出版社,2014.

[18]Xin-hua YOU. Brief Discuss the Application of Object-oriented in Java Language Programming Course[A]. Advanced Science and Industry Research Center.Proceedings of 2018 3rd International Conference on Automation, Mechanical and Electrical Engineering (AMEE 2018)[C].Advanced Science and Industry Research Center:Science and Engineering Research Center,2018:5.

[19]Menglin Liu. Design and Research of Batch Query System Based on Java[A]. Research Institute of Management Science and Industrial Engineering.Proceedings of 2018 4th World Conference on Control, Electronics and Computer Engineering (WCCECE 2018)[C].Research Institute of Management Science and Industrial Engineering:计算机科学与电子技术国际学会(Computer Science and Electronic Technology International Society),2018:5.

Guess you like

Origin blog.csdn.net/licongzhuo/article/details/134485292